A Q&A with Head of Security Solutions at Abraxas
The post A Q&A with Head of Security Solutions at Abraxas appeared first on AI Security Automation.
The post A Q&A with Head of Security Solutions at Abraxas appeared first on Security Boulevard.
The post A Q&A with Head of Security Solutions at Abraxas appeared first on AI Security Automation.
The post A Q&A with Head of Security Solutions at Abraxas appeared first on Security Boulevard.
In December, a senior Chinese cyber official offered what U.S. representatives took as tacit admission: China was behind a series of cyber intrusions targeting U.S. critical infrastructure. As reported by The Wall Street Journal, this extraordinary moment came during a closed-door meeting in Geneva—one that has since confirmed what many cybersecurity professionals have long suspected: the next stage of overt cyber action might be here.
The post How China’s Admission Reinforces the Urgency for AI-Powered, Preemptive Cybersecurity appeared first on Security Boulevard.
Recapping Synack's Women in Cyber panel: Inside the hard conversations about AI risk, hiring struggles, and why resilience
The post Leading Through Uncertainty: AI, Risk, and Real Talk from RSAC’s Women in Cyber appeared first on Security Boulevard.
While the shortest distance between two points is a straight line, a straight-line attack on a large language model isn't always the most efficient — and least noisy — way to get the LLM to do bad things. That's why malicious actors have been turning to indirect prompt injection attacks on LLMs.
The post Indirect prompt injection attacks target common LLM data sources appeared first on Security Boulevard.
Vulnerability management remains core to reducing cyber risk — but as the attack surface grows, teams need a risk-driven strategy that looks beyond vulnerabilities to see the bigger picture. Discover how exposure management unifies data and prioritizes real exposures — keeping teams proactive and ahead of cyber threats.
The limits of siloed securityOver the years, the attack surface has grown significantly with the rise of cloud computing, software as a service (SaaS), internet of things (IoT), operational technology (OT), AI and other emerging technologies. The COVID-19 pandemic accelerated this shift, with many companies adopting hybrid, remote-office models, even as many, in recent years, have instituted return-to-office policies.
As digital infrastructure expanded, security teams added more tools to combat emerging cyber threats, leading to tool sprawl. Now, many organizations juggle dozens of different security tools, resulting in inefficiencies, especially when managing risk data and coordinating remediation efforts.
On the data side, cybersecurity teams are stuck with siloed, disorganized and often duplicate risk data. Without context, prioritization becomes a guessing game, making it hard to identify the most critical risks to address. At the same time, security leaders struggle to answer basic questions like, “How exposed are we to an attack?”
The operational challenge is equally concerning. Domain-specific practices remain manual and coordination between IT, DevOps, SecOps and CloudOps is hindered by fragmented tools and misaligned priorities. This fragmented approach leaves critical issues unaddressed for weeks or even months, significantly increasing exposure.
This is the reality of security operations today — fragmented data, inefficient workflows and a lack of comprehensive context leave security teams not only struggling to mitigate risks but also to fully understand their true level of exposure.
Source: Tenable, May 2025 The evolution to exposure managementFor years, vulnerability management has been key to cybersecurity, providing crucial visibility into weaknesses across IT environments. It’s the first and most essential step in securing digital assets — helping security teams identify and catalog vulnerabilities across systems, applications and networks. However, as enterprise ecosystems expand and interconnect, vulnerabilities represent just one piece of a much broader risk landscape.
Today, risk spans every corner of the attack surface — from misconfigurations in cloud environments to excessive permissions and exposed identities. These risks often create greater exposure than vulnerabilities alone, underscoring the need for a more holistic, contextual approach to managing cyber risk.
When it comes to exposure management vs. vulnerability management, the difference is clear: vulnerability management tells you where security gaps exist — exposure management helps you understand the risk and prioritize action. By shifting from a reactive, vulnerability-centric approach to a broader, risk-driven strategy, organizations can focus on the exposures that truly matter, making their security programs more efficient than ever.
To effectively reduce exposure, security teams need more than just a list of vulnerabilities; they need context to understand which exposures truly matter in their unique environment, how they connect and their potential impact on the business. This is where exposure management comes in.
Exposure management vs. vulnerability managementExposure management builds on vulnerability management, but takes it a step further by breaking down silos and adding context for a complete view of risk across the attack surface.
When it comes to exposure management vs. vulnerability management, the difference is clear: vulnerability management tells you where security gaps exist — exposure management helps you understand the risk and prioritize action. By shifting from a reactive, vulnerability-centric approach to a broader, risk-driven strategy, organizations can focus on the exposures that truly matter, making their security programs more efficient than ever.
Unified visibility is the foundation for exposure managementTo achieve effective exposure management, organizations need a comprehensive view of their entire attack surface. This means pulling together all available data from across their security tools, including those for applications, cloud, identity, OT, endpoint, asset inventories, CMDBs, threat intelligence feeds and more.
By combining insights from these diverse data sources, security teams can see the bigger picture, connecting the dots between assets, vulnerabilities, misconfigurations and existing compensating controls across multiple environments.
Consolidating security data from siloed tools facilitates a unified, holistic view of risk. This approach enables organizations to:
✔ Manage risk from one place: Break down silos and gain unified visibility across the entire attack surface.
✔Prioritize real exposure: Uncover attack paths and toxic risk combinations across all security data for effective cross-domain prioritization.
✔ Remediate with context: Identify choke points and pinpoint the most effective remediation strategies to address critical risks across the entire security landscape.
✔ Create holistic reports: Achieve a single source of truth for holistic reporting on risks and exposure findings across all environments.
By breaking down data silos and integrating insights from multiple security tools, organizations can reduce the likelihood of a breach and minimize risk exposure across the attack surface. Instead of viewing risks in isolation, security teams can connect the dots — understanding how attackers see their environment and taking smarter, more proactive action to reduce exposure.
Source: Tenable, May 2025 Bringing exposure management to lifeNow that we’ve covered the fundamentals of exposure management, let’s explore how to put this approach into practice and build an effective program that drives real security outcomes.
By following these best practices, organizations can move beyond reactive security and take a proactive approach — one that not only identifies risk but actively reduces exposure, strengthening their overall cyber resilience.
Learn moreThe post From Managing Vulnerabilities to Managing Exposure: The Critical Shift You Can’t Ignore appeared first on Security Boulevard.
Arkose Labs is a global cybersecurity company that specializes in account security, including bot management, device ID, anti-phishing and email intelligence. Its unified platform helps the world’s biggest enterprises across industries, including banking, gaming, e-commerce and social media, protect user accounts and digital ecosystems from malicious automation, credential
The post How Escape Enabled Deeper Business Logic Testing for Arkose Labs appeared first on Security Boulevard.
Today, it is safe to say that social engineering has become the most dangerous and costly form of cybercrime that businesses face.
The post Protect Yourself From Cyber’s Costliest Threat: Social Engineering appeared first on Security Boulevard.
Ultimately, investing in security isn't just about the digital world. For organizations to be successful, they need to take a fundamentally holistic approach to protecting what matters most - people, company data and IP.
The post The Most Pressing Security Threat to Business is Hidden in Plain Sight appeared first on Security Boulevard.
Managing SSL certificates used to be tedious and manual, but not anymore. With Sectigo’s Certificate as a Service (CaaS), partners can shift from per-cert chaos to scalable, subscription-based simplicity. Automate renewals, support OV certs, and boost profits with predictable revenue and less operational stress.
The post From certificate chaos to scalable simplicity: Why partners are rethinking how they sell and manage SSL appeared first on Security Boulevard.
As the world roils in turmoil on numerous fronts, bad actors are seizing the moment by stepping up DDoS activity.
The post It’s a Mad, Mad World for DDoS; BGP Continues to Confound Security Teams appeared first on Security Boulevard.
Thales Named an Overall Leader in 2025 KuppingerCole Leadership Compass for Enterprise Secrets Management
madhav
Thu, 05/08/2025 - 06:31
We’re proud to share that Thales has been recognized as an Overall Leader in the 2025 KuppingerCole Leadership Compass for Enterprise Secrets Management. This prestigious ranking highlights our strength across three critical areas: product capabilities, innovation, and market presence.
Tackling the Rising Challenge of Secrets SprawlAs organizations increasingly rely on DevOps tools, cloud-native applications, and distributed systems, managing secrets like credentials, API keys, certificates, and tokens has become more complex — and more critical. According to the 2024 Thales Data Threat Report report, 61% cited secrets management as a top DevOps challenge. This lack of visibility leads to “secrets sprawl,” significantly increasing the risk of unauthorized access and data breaches.
In modern IT environments, every service, tool, and machine identity introduce more secrets that need to be securely managed. Without a centralized, scalable approach, organizations are left vulnerable to attack vectors that exploit unmanaged or orphaned secrets.
Why KuppingerCole Recognized Thales as an Overall LeaderIn its 2025 report, KuppingerCole noted the growing need for comprehensive secrets management due to:
“The increasing complexity of IT environments, the proliferation of machine identities, and the critical need to secure DevOps pipelines, cloud-native applications, and industrial IoT (IIoT) deployments.”
Thales was evaluated against strict criteria, including the ability to manage secrets across their full lifecycle, support for various identity types, scalability, integration ease, and governance strength.
Key strengths that set Thales apart include:
At the heart of this recognition is CipherTrust Secrets Management powered by Akeyless (CSM). CSM automates and protects access to mission-critical secrets across DevOps tools and cloud environments. It extends the CipherTrust Data Security Platform with a centralized, scalable way to:
With CSM, security and governance teams can gain full visibility and control over secrets, helping reduce human error and streamline compliance.
Learn MoreTo explore the full analysis and see why Thales was named an overall leader, download the full 2025 KuppingerCole Leadership Compass for Enterprise Secrets Management for Humans, Workloads, and Things, and for further background, join our webinar entitled A Comprehensive Guide to Protecting Secrets and APIs.
Encryption Thales | Cloud Protection & Licensing Solutions
More About This Author >
Schema
{
"@context": "https://schema.org",
"@type": "BlogPosting",
"mainEntityOfPage": {
"@type": "WebPage",
"@id": "https://cpl.thalesgroup.com/blog/encryption/thales-leader-enterprise-secrets-management-2025"
},
"headline": "Thales Named Leader in Secrets Management",
"description": "Discover why Thales was named an Overall Leader in KuppingerCole’s 2025 Compass for Enterprise Secrets Management, driven by CipherTrust innovation.",
"image": "",
"author": {
"@type": "Person",
"name": "",
"url": ""
},
"publisher": {
"@type": "Organization",
"name": "Thales Group",
"description": "The world relies on Thales to protect and secure access to your most sensitive data and software wherever it is created, shared, or stored. Whether building an encryption strategy, licensing software, providing trusted access to the cloud, or meeting compliance mandates, you can rely on Thales to secure your digital transformation.",
"url": "https://cpl.thalesgroup.com",
"logo": "https://cpl.thalesgroup.com/sites/default/files/content/footer/thaleslogo-white.png",
"sameAs": [
"https://www.facebook.com/ThalesCloudSec",
"https://www.twitter.com/ThalesCloudSec",
"https://www.linkedin.com/company/thalescloudsec",
"https://www.youtube.com/ThalesCloudSec"
]
},
"datePublished": "2025-05-08",
"dateModified": "2025-05-08"
}
The post Thales Named an Overall Leader in 2025 KuppingerCole Leadership Compass for Enterprise Secrets Management appeared first on Security Boulevard.
When Way Kuo, a senior fellow at the Hong Kong Institute for Advanced Study, claimed in a working paper appearing in the SSRN Electronic Journal that his team had “devised a way to accurately and swiftly predict when prime numbers will appear,” it set off a bit of a tizzy.
The post Do the Math: Prime Number Breakthrough Could Upend Encryption appeared first on Security Boulevard.
Phishing-Resistant MFA: Why FIDO is Essential
madhav
Thu, 05/08/2025 - 04:47
Phishing attacks are one of the most pervasive and insidious threats, with businesses facing increasingly sophisticated and convincing attacks that exploit human error. Traditional Multi-Factor Authentication (MFA), while a step up from password-only security, is no longer enough to fight modern phishing schemes.
Today’s threat actors use AI to craft compelling phishing campaigns and advanced social engineering tactics to slip past MFA, resulting in credential theft and account takeovers. As malefactors hone their methods, entities must adopt phishing-resistant multi-factor authentication to secure their digital identities.
The Fast Identity Online (FIDO) standard stands out as a robust solution that helps businesses implement authentication mechanisms that eliminate dependence on passwords and help mitigate phishing risks.
The Rising Threat of Phishing and Credential-Based AttacksAs malicious actors evolve their tactics, adding AI to their arsenal of malicious tools and automating and scaling their campaigns on an unprecedented scale, phishing remains a top initial attack vector. According to Thales’s 2024 Data Threat Report, 93% of Enterprises reported a rise in threats, and phishing was identified as one of the three fastest-growing attack types, chosen by 36% of respondents. AI-powered, highly convincing phishing can clone legitimate websites and manipulate users into divulging sensitive credentials and data.
Credential theft is particularly dangerous as it facilitates account takeovers, lateral movement within networks, and access to critical business systems. Attackers can leverage these stolen credentials to slip through perimeter defenses, compromise cloud environments, and carry out ransomware attacks.
High-profile breaches illustrate the devastating impact of credential-based attacks. For instance, a breach discovered in hospitalities businesses was reportedly initiated through social engineering tactics that exploited weak authentication controls. Similarly, the data breach that targeted a large technology company saw bad actors tricking an employee into giving MFA approval, highlighting the limitations of conventional MFA. These incidents stress the dire need for firms to adopt phishing-resistant multi-factor authentication mechanisms like FIDO.
How FIDO Standards Enhance MFA SecurityTo effectively fight phishing, authentication mechanisms must reduce the use of shared secrets, like passwords and codes, to eliminate the risk of credential interception and unauthorized access. Phishing-resistant MFA ensures that even if a bad actor deceives a user, they cannot get their hands on reusable credentials or compromise accounts.
FIDO standards provide a basis for strong authentication by replacing conventional passwords with cryptographic security keys. The key principles of FIDO authentication include:
FIDO-based authentication addresses the risks associated with traditional MFA—one-time passcodes (OTPs) and push notifications—which can be intercepted or manipulated. Unlike conventional MFA, FIDO authentication ensures that credentials cannot be used outside the legitimate authentication flow, rendering phishing attacks ineffective.
The Business Benefits of Phishing-Resistant MFAAdopting unphishable MFA arms entities with a host of security and operational benefits, including:
Thales provides phishing-resistant authentication solutions that help businesses protect their digital identities. With a suite of FIDO-certified authentication devices, Thales enables companies to implement secure, scalable, and user-friendly identity security. Thales’ solutions integrate flawlessly with third parties or Thales identity and access management (IAM) frameworks, offering a future-proof approach to eradicating password-based vulnerabilities.
Phishing attacks are becoming more sophisticated, making traditional MFA insufficient for protecting digital identities. Organizations must adopt phishing-resistant MFA to mitigate credential theft and account takeovers. By leveraging Thales’ expertise in cybersecurity and identity protection, entities can stay ahead of evolving phishing threats and maintain compliance with industry regulations.
FIDO-based authentication gives firms a robust security framework, eliminating passwords and ensuring strong, phishing-proof access controls. Businesses looking to enhance security while improving user experience should explore Thales’ authentication solutions.
Download our Phishing-Resistant MFA eBook and Passwordless 360 Report to learn more.
Identity & Access Management Sarah Lefavrais | IAM Product Marketing Manager
More About This Author >
Schema
{
"@context": "https://schema.org",
"@type": "BlogPosting",
"mainEntityOfPage": {
"@type": "WebPage",
"@id": "https://cpl.thalesgroup.com/blog/access-management/fido-phishing-resistant-mfa-authentication"
},
"headline": "Why FIDO is Critical for Phishing-Resistant MFA",
"description": "Explore how FIDO-based MFA helps businesses eliminate phishing threats, enhance user security, and meet compliance standards with Thales solutions.",
"image": "",
"author": {
"@type": "Person",
"name": "Sarah Lefavrais",
"url": "https://cpl.thalesgroup.com/blog/author/slefavrais"
},
"publisher": {
"@type": "Organization",
"name": "Thales Group",
"description": "The world relies on Thales to protect and secure access to your most sensitive data and software wherever it is created, shared, or stored. Whether building an encryption strategy, licensing software, providing trusted access to the cloud, or meeting compliance mandates, you can rely on Thales to secure your digital transformation.",
"url": "https://cpl.thalesgroup.com",
"logo": "https://cpl.thalesgroup.com/sites/default/files/content/footer/thaleslogo-white.png",
"sameAs": [
"https://www.facebook.com/ThalesCloudSec",
"https://www.twitter.com/ThalesCloudSec",
"https://www.linkedin.com/company/thalescloudsec",
"https://www.youtube.com/ThalesCloudSec"
]
},
"datePublished": "2025-05-8",
"dateModified": "2025-05-8"
}
The post Phishing-Resistant MFA: Why FIDO is Essential appeared first on Security Boulevard.
Many don’t realize that
cyberattacks against Critical Infrastructure sectors, can cause more than an inconvenience
of a temporary power outage.
Critical Infrastructures are a
favorite of aggressive Nation State cyber threats. In addition to communications disruptions,
power outages, and healthcare billing, these attacks can also seek to disrupt
food distribution.
The result – empty shelves and
people scrambling to acquire groceries.
There is currently a cyber-attack affecting
the main grocery retailer in Scotland, resulting in empty shelves for many foodstuffs.
Nothing is as effective at changing
people’s attitudes and motivating capitulation than the unavailability of
food. It is an age-old strategy used for
sieging forts, towns, and even nations.
Cybersecurity now protects many of
the critical path systems for food production, transportation, and distribution.
It puts a different spin on the
value of cybersecurity and how aggressive nations can wreak havoc on the
citizens of their adversary. It is
something to consider as we move into an age where cyber-attacks are being
leveraged as a foreign policy tool.
Cybersecurity is key and we must remain diligent to protect
our critical infrastructure sectors!
For more Cybersecurity Insights: https://www.cybersecurityinsights.us/
Follow me on Substack for updates: https://substack.com/@matthewrosenquist
or LinkedIn: https://www.linkedin.com/in/matthewrosenquist/
The post Cyberattacks on Critical Infrastructures Makes Us Very Vulnerable appeared first on Security Boulevard.
Are NHIs the Game Changer in Cybersecurity? Imagine being able to transform your organization’s cloud security strategy with NHI’s empowered technology. Non-Human Identities (NHIs) promise to do just that. So, how does this seemingly complex concept stand to revolutionize cybersecurity? Let’s delve a little deeper. NHIs are emerging as a potent force in data protection, […]
The post How Empowered NHIs Transform Cloud Security appeared first on Entro.
The post How Empowered NHIs Transform Cloud Security appeared first on Security Boulevard.
As the digital world rapidly expands, the need for secure, seamless authentication becomes more urgent. At the forefront of this evolution is FIDO (Fast Identity Online), promoting password-less authentication that combines convenience with strong security. But FIDO’s long-term success depends not only on its security capabilities but also on achieving true interoperability across platforms and..
The post Breaking the Password Barrier: FIDO’s Path to Seamless Security appeared first on Security Boulevard.
Author/Presenter: George Wang
Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel.
The post BSidesLV24 – Proving Ground – Building A Security Audit Logging System On A Shoestring Budget appeared first on Security Boulevard.
Graph-based anomaly detection transforms how network operators uncover threats and service issues by providing a deeper, relationship-driven understanding of all network activity traversing the eco-system. Unlike traditional methods that analyze isolated data points or rely on predefined rules, a graph-based approach leverages AI, ML, and graph theory to map and analyze the intricate relationships between […]
The post Tech Talk- AI Engine: A look at Transformative AI for Deep Insight into Anomalous Traffic appeared first on Security Boulevard.
via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘About 20 Pounds’ appeared first on Security Boulevard.
Discover Pulumi's enhanced Components feature and IDP for streamlined cloud infrastructure management. Simplify your IaC process today!
The post Pulumi Enhances Developer Experience with Improved IDP and Components appeared first on Security Boulevard.